Security

  • Learn how to keep IoT devices secure – from design to decommission

    In this final class, we will cover the critical aspects of how to test and deploy our IoT solution, and how to keep it secure and operational through ongoing monitoring and maintenance.

    Read Article
  • Have we forgotten what the ancients taught us in building defense systems?

    Have we forgotten what the ancients taught us in building defense systems?

    I find the multilayered defense system built into many ancient forts fascinating. Fort Dún Aonghasa in Ireland is a great example of how a multilayered defense system was used.

    Read Article
  • SecureRF and Intel deliver future-proof FPGA security

    Read Article
  • Identifying secure firmware update mechanisms and open source options for embedded Linux devices

    Identifying secure firmware update mechanisms and open source options for embedded Linux devices

    The traditional, and best-until-proven-otherwise way of updating an embedded device is performing a whole image update. In baremetal devices, this would be the whole image with all the device firmware

    Read Article
  • ×

    Stay updated on security-related design topics with the security edition of our Embedded Daily newsletter.

    Subscribed! Look for 1st copy soon.
    Error - something went wrong!
  • Skkynet to Hold OPC UA Sandpit Event in Osaka

    Technology providers from six countries gather in Japan to demonstrate secure Industrial IoT cloud connectivity for OPC UA products.

    Read Article
  • Demystifying Hardware Full Disk Encryption Technology for Military Data Storage

    Demystifying Hardware Full Disk Encryption Technology for Military Data Storage

    NAND flash media reliability concerns have largely been addressed through (1) advances in error correction code (ECC) and wear leveling algorithms and (2) NAND flash over-provisioning.

    Download PDF
  • A Low-risk, COTS Approach to Building Safety Certifiable Processing Subsystems

    A Low-risk, COTS Approach to Building Safety Certifiable Processing Subsystems

    How to affordably decrease safety critical processing subsystem development time and program risk using DO-178 / DO-254 certifiable off-the-shelf building blocks.

    Download PDF
  • Learn how to design safe, secure, and reliable IoT critical infrastructure systems

    This class, led by Charles J. Lord, PE, President and Chief Trainer at Blue Ridge Advanced Design and Automation, will teach you how to adapt and stay relevant in this new software-defined world.

    Read Article
  • Build security into the connected car development life cycle

    Build security into the connected car development life cycle

    Best practices dictate that security, like functional safety, can’t be an afterthought. It must be part of the software development life cycle as a whole.

    Read Article
  • Embedded Insiders Podcast – Secure your network, no matter the cost

    Embedded Insiders Podcast – Secure your network, no matter the cost

    As the old axiom goes, “if you have to ask the price, then you can’t afford it.” In fact, depending on the data that you’re protecting, it’s possible that there’s no cost that’s too high.

    Read Article
  • Wibu-Systems Joins Dell Internet of Things (IoT) Solutions Partner Program

    Partnership Reinforces Commitment Towards Secure IoT Deployments

    Read Article
  • Leti and Partners in PiezoMAT Project Develop New Fingerprint Technology for Highly Reliable Security and ID Applications

    Leti today announced that the European R&D project known as PiezoMAT has developed a pressure-based fingerprint sensor that enables resolution more than twice as high as currently required by the...

    Read Article
  • ISO 26262 a Pain in the ASIL?

    ISO 26262 a Pain in the ASIL?

    There is an ever-widening range of automotive electrical and/or electronic (E/E/PE) systems such as adaptive driver assistance systems, anti-lock braking systems, steering and airbags.

    Download PDF
  • Addressing Your Insecurities with CERT C

    Addressing Your Insecurities with CERT C

    The CERT C Coding Standard consists of a set of guidelines designed to assist in the development of safe, reliable, and secure systems.

    Download PDF
  • DO-178C: Get on a High with your Software Development

    DO-178C: Get on a High with your Software Development

    This technical briefing is an introduction to both the DO-178C standard, and the way in which automated tools can help achieve its objectives.

    Download PDF
  • Five Minutes With…Louis Parks, CEO, SecureRF8:42

    Five Minutes With…Louis Parks, CEO, SecureRF

    Securing the Internet? That’s not exactly a new concept. In fact, not even close. However, what differentiates SecureRF from the dozens and dozens of others that make the same claim is that they secur

    Watch Video
  • Vodafone joins prpl Foundation with eye on advancing digital home and smart gateways

    Vodafone joins prpl Foundation with eye on advancing digital home and smart gateways

    Vodafone’s vision falls very much in line with prpl Foundation initiatives.

    Read Article
  • The Cavalry has arrived for automotive cybersecurity. What's next?

    The Cavalry has arrived for automotive cybersecurity. What's next?

    After the publication of Charlie Miller and Chris Valasek's remote commandeering of a Jeep's CAN bus brought national attention to the issue of automo...

    Read Article
  • Securing the edge with ARM TrustZone for v8-M

    Securing the edge with ARM TrustZone for v8-M

    ARM's new 32-bit ARMv8-M architecture was introduced in 2015, adding TrustZone security extensions for Cortex-M microcontrollers (MCUs), among other f...

    Read Article
  • Encryption 101: Choosing the right scheme

    This intro to encryption offers some of the pitfalls that can derail the inexperienced user. About six years ago, I started working with a UK crypto c...

    Read Article
  • loading
    Loading More...